Friday, December 11, 2015

One-click App Deployment with Server-side Git Hooks

The article shows you how to deploy a simple website using no more than a git post-receive hook. It covers just enough background information so that the reader can go further and expand their knowledge as their time permits.

read :

How To Set Up Automatic Deployment with Git

This article will teach you how to use Git when you want to deploy your application. While there are many ways to use Git to deploy  applications, this tutorial will focus on the one that is most straightforward. It assumes you already know how to create and use a repository on your local machine.


Using Git to manage a web site

Suppose HTML source for your web site lives in a Git repository on your local workstation. This article describes how you can set things up so that you can make changes live by running just "git push web".

Read :

Wednesday, November 18, 2015

Supercomputer Leaders Come Together on New Open Source Framework

The Linux Foundation and a consortium of high-performance computing (HPC) leaders last week announced the creation of the OpenHPC Collaborative Project, which has the goal of creating a new open source framework to support the world's most sophisticated HPC environments. Members of the new consortium include several national laboratories and academic supercomputing facilities, as well as Intel, Hewlett-Packard, Dell, and Lenovo. Currently, 97 percent of the world's fastest supercomputers run Linux. However, as systems become faster and more powerful, a new and dedicated solution for HPC increasingly is warranted. "The use of open source software is central to HPC, but lack of a unified community across key stakeholders...has caused duplication of effort and has increased the barrier to entry," says Linux Foundation executive director Jim Zemlin. "OpenHPC will provide a neutral forum to develop one open source framework that satisfies a diverse set of cluster environment use-cases." The new initiative also is being driven by increased interest in HPC among the private sector as an aid to big data analytics. Analysts note this is especially true in the world of finance, which has significantly increased its supercomputing efforts in recent years.

ZDNet (11/12/15) Steven J. Vaughn-Nichols

Top 10 Rising and Falling Buzzwords in Tech Job Postings Bloomberg Business

Some of the most popular tech buzzwords of a year ago, such as big data, no longer have the same cachet with job applicants, according to a study of more than 500,000 tech job postings. Older buzzwords are being replaced by newer terms, including artificial intelligence and real-time data. Among the top five buzzwords, only two were even on the map a year ago. Each term included in the study was measured using three main criteria: the number of people applying for a job containing the phrase, the percentage of those applicants with the skills and background to qualify, and the time it took to fill the role since the job was posted. The results were then ranked by changes in effectiveness from a year ago.

Artificial intelligence is one of the new tech buzzwords, with tech job applicants attracted by listings that mention AI. Over the past six months, the term's usage among the best-performing tech job listings has quintupled. Real-time data is also a hot new buzzword. Supposedly, this term conveys that the hiring company wants to build products based on the latest information, rather than just a lot of information. Other terms that are gaining in popularity include "high availability" and "robust and scalable." Also, thanks to the rising importance of diverse workplaces to many applicants, particularly in the tech industry, job postings benefit from a reference to "inclusiveness."

The term "big data" is the biggest loser in technology job ads. Two years ago, everything was about big data, but the term had started to drop off five or six months ago. Today, engineering jobs that mention "big data" perform 30% worse, on average, than those that do not. Also, corporate jargon turns off many applicants, so the term "virtual team," which refers to telecommuting, is more than 10 times as likely to appear in jobs with low applicant counts than in successful listings. Other buzzwords losing ground include "troubleshooting" and "subject matter expert."
Click Here to View Full Article 

Monday, November 16, 2015

Teaching Machines to Learn on Their Own

Scientific American (11/10/15) Larry Greenemeier; Steve Mirsky 

In an interview, Xerox Palo Alto Research Center CEO Stephen Hoover discusses the swift changes machine learning is undergoing. He says computers' growing ability "to understand in much deeper ways what it is that we're asking and trying to do" is starting to be incorporated into products, such as the Nest thermostat. Nest, for example, has a built-in agent that learns from user behavior and infers context so it can anticipate how to operate. Hoover says machine learning involves the machine deducing the right answer from data input and programming itself, instead of the programmer breaking down a task into a series of steps. "You're going to show the computer a bunch of instances and you're going to label it, and it's going to learn how to do it," he says. "There's a core code which is that learning algorithm, and then that's applied to multiple contexts.' Hoover credits Moore's Law with enabling continued advances in machine learning. "Hardware not only begets the capability to create new kinds of software like machine learning, but also is creating new ways to sense, measure, and control the world," he says. "And that feedback loop is again one of the big changes that we're going to see coming."

Get Ready for Your Digital Model

he Wall Street Journal (11/12/15) Pedro Domingos 

Within 10 years, people will entrust their data to machine-learning algorithms that build personal digital models of them, writes University of Washington professor Pedro Domingos. He predicts a new kind of company will be conceived to store, safeguard, and apply such data to the construction, maintenance, and interactions of these models. Domingos says it would record a customer's every digital interaction and feed it to the model in exchange for a subscription fee. He notes all this would require on the technical side is a proxy server through which these interactions are routed and recorded. "Once a firm has your data in one place, it can create a complete model of you using one of the major machine-learning techniques: inducing rules, mimicking the way neurons in the brain learn, simulating evolution, probabilistically weighing the evidence for different hypotheses, or reasoning by analogy," Domingos says. He thinks these models could be duplicated almost infinitely to multitask, selecting the best options for the user based on accumulated behavior and preferences. "To offset organizations' data-gathering advantages, like-minded individuals will pool the data in their banks and use the models learned from that information," Domingos says. He predicts cyberspace will evolve into "a vast parallel world that selects only the most promising things to try out in the real one--the new, global subconscious of the human race."

Friday, September 11, 2015

Tecmint: Linux Howtos, Tutorials & Guides is a website that publishes practical and useful out-of-the-box articles for aspirant like you and me. We seek to present exceptional, remarkable tips, tutorials, and resources that the modern web professional will appreciate.
TecMint was started on 15th August 2012 by technical professionals and all the articles and contents are written by talented professionals around the globe, keeping in high importance on quality, comprehensiveness, and usefulness goes into each of the articles published.


Wednesday, July 29, 2015

Raspberry Pi TOR/VPN Router


Raspberry Pi TOR/VPN Router

Surf the Internet securely with your very own portable WiFi VPN/TOR router. You can configure a Raspberry Pi with Linux and some extra software to connect to a VPN server of your choice.

Read more:

Saturday, July 25, 2015

What are the principles of an open organization?

What are the principles of an open organization?


When there is a choice, we choose to share—early and often.


Real people. Real stories. Real solutions. Always.


Openness and transparency are only useful if you make the information available in ways that your audiences can (and will) use it.


Always default to open. Avoid hurdles and hoops.

Thursday, July 23, 2015

Demystifying copyleft

Demystifying copyleft, by Chrissie Himes, Operations Assistant and Donald Robertson, Copyright and Licensing Associate

Copyright is the legal mechanism afforded to the authors of original creative works, such as books, music, and software. Under 17 U.S. Code § 106, the exclusive rights granted to the artists are:
(1) the right to reproduce the copyrighted work;
(2) the right to prepare derivative works based upon the work;
(3) the right to distribute copies of the work to the public;
(4) the right to perform the copyrighted work publicly; and
(5) the right to display the copyrighted work publicly.

Copyleft is a tool that works within copyright law, easing the process of licensing creative works to be used, retooled, and/or shared. For instance, you may have a new piece of software that you would like the general public to be able to build upon and fix bugs within. But under U.S. copyright law you possess the exclusive right to prepare derivative works. If you don't provide your users with a license, they won't be able to do all the things that they should be able to do, like modify and share the work. So while many projects think that simply putting the source code up on a repository is good enough to share their work, unless they choose and apply a license, all their hard work will go to waste. So choosing a good copyleft license that most communicates your intent is of great importance. The GNU General Public License (GPLv3) is a strong copyleft license that ensures not only that users have all the rights they need to share and modify your work, but that every downstream user has those same rights. The GNU Affero General Public License (AGPLv3) is also a strong copyleft license like the GPL, but with an additional provision that ensures that users interacting with modified versions of the code via a network have the opportunity to receive the source code. Finally, the GNU Lesser General Public License (LGPLv3) is a weak copyleft license. It allows users to link to the work under their own terms, while still ensuring that downstream users receiving modified versions of the work itself still have their rights intact.

While this brief introduction gives a basic idea of how copyleft works, there is plenty more to learn. In addition to information provided by the FSF via our licensing portal1 there is now another great resource for learning about copyleft licensing: is a collaborative project run jointly by the FSF and the Software Freedom Conservancy2 that pools and shares information about copyleft. This information is being made into a book, Copyleft and the GNU General Public License: A Comprehensive Tutorial and Guide. It combines resources developed by several organizations into one comprehensive guide. Is a continual work in progress, but the FSF will from time to time endorse and publish particular versions of the document. For example, we used the guide as part of the foundation for our continuing legal education (CLE) seminar on GPL Enforcement and Legal Ethics last year, and plan to use it for future CLE events.
But is more than just a collaboration between the FSF and the Software Freedom Conservancy: it is a community effort. Its tutorial and guide consist of over 150 pages of useful information, but it takes quite a bit of work to maintain. We invite everyone to help update and revise the guide. You don't need to be a legal whiz kid to help out; one of the biggest tasks to take on is copy editing. Every pull request helps, so dive in!


Thursday, July 16, 2015


Le Cnam Liban est un établissement d'utilité publique d’enseignement supérieur.

  • Il s’adresse en priorité aux étudiants qui travaillent et qui souhaitent poursuivre leurs études.
  • Il travaille en étroite collaboration avec les entreprises afin de répondre à leurs attentes en matière de formation.
  • Il remplit trois missions : 
    • former tout au long de la vie, 
    • faire de la recherche et 
    • diffuser la culture scientifique et technique.
Le département informatique Réseaux et télécommunication 

Tuesday, July 14, 2015

Thursday, July 2, 2015

MongoDB Vs MySql

Why use MongoDB instead of MySQL?

Organizations of all sizes are adopting MongoDB because it enables them to build applications faster, handle highly diverse data types, and manage applications more efficiently at scale.
Development is simplified as MongoDB documents map naturally to modern, object-oriented programming languages. Using MongoDB removes the complex object-relational mapping (ORM) layer that translates objects in code to relational tables.
MongoDB’s flexible data model also means that your database schema can evolve with business requirements. For example, the ALTER TABLE command required to add a single, new field to Craiglist’s MySQL database would take months to execute. The Craigslist team migrated to MongoDB because it can accommodate changes to the data model without such costly schema migrations.
MongoDB can also be scaled within and across multiple distributed data centers, providing new levels of availability and scalability previously unachievable with relational databases like MySQL. As your deployments grow in terms of data volume and throughput, MongoDB scales easily with no downtime, and without changing your application. In contrast, to achieve scale with MySQL often requires significant, custom engineering work.

What are common use cases for MongoDB?

MongoDB is a general purpose database that is used for a variety of use cases. The most common use cases for MongoDB include Single View, Internet of Things, Mobile, Real-Time Analytics, Personalization, Catalog, and Content Management.

When would MySQL be a better fit?

While most modern applications require a flexible, scalable system like MongoDB, there are use cases for which a relational database like MySQL would be better suited. Applications that remquire complex, multi-row transactions (e.g., a double-entry bookkeeping system) would be good examples. MongoDB is not a drop-in replacement for legacy applications built around the relational data model and SQL.
A concrete example would be the booking engine behind a travel reservation system, which also typically involves complex transactions. While the core booking engine might run on MySQL, those parts of the app that engage with users – serving up content, integrating with social networks, managing sessions – would be better placed in MongoDB

Are MongoDB and MySQL used together?

There are many examples of hybrid deployments of MongoDB and MySQL. In some cases, it’s a matter of using the right tool for the job. For example, many e-commerce applications use a combination of MongoDB and MySQL. The product catalog, which includes multiple products with different attributes, is a good fit for MongoDB’s flexible data model. On the other hand, the checkout system, which requires complex transactions, would likely be built on MySQL or another relational technology.
In other cases, new business requirements push organizations to adopt MongoDB for the next-generation components of their applications. For example, Sage Group, one of the world’s leading suppliers of business management software and services, integrated MongoDB into its popular Enterprise Resource Planning (ERP) solution for midsize companies. Sage customers now enjoy a higher degree of functionality and personalization as a result of the integration. While many Sage products were originally built on and continue to run on MySQL, the latest user experience functionality centers around MongoDB.
These few exceptions aside, we think MongoDB is almost always a better option than MySQL because of its flexible data model and scalable architecture.

Want to Learn More? Get the RDBMS to MongoDB Migration Guide

Relational databases are being pushed beyond their limits because of the way we build and run applications today, coupled with growth in data sources and user loads. To address these challenges, companies like, MTV and Cisco have migrated successfully from relational databases to MongoDB. In this white paper, you'll learn:
  • Step by step how to migrate from a relational database to MongoDB.
  • The relevant technical considerations, such as differences between the relational and document data models and the implications for schema design.
  • Indexing, queries, application integration and data migration.
Migration rdbms nosql mongodb

Thursday, June 18, 2015

Full–featured "Open Source" OpenVZ VPS Server products

A Free Control Panel


Full–featured OpenVZ VPS Server products

Eurabia Hosting deliver a full–fledged OpenVZ VPS Server jam–packed with the whole set of resources that you may need so as to maintain your media–intensive online presence. You will enjoy a group of Linux OS versions, a free of cost Online Control Panel, SSD space for storage and assured root server access to the server. Additionally, 100% CPU use plus huge RAM amounts warrant extremely fast web server data transfer rates. We manage your information by carrying out every–week off–site file backups.

Wednesday, June 17, 2015

Getting Started with Berkeley DB Java Edition

Pascal Fares

ACM TechNews Text Edition, Wednesday, June 17, 2015

> "Using Virtual Reality to Overcome Fear, Reduce Prejudice"
> "Alabama Researcher Devises a Way to Harness Unused IoT Power"
> "NSF Awards $12 Million to Spur an Engineering Education Revolution"
> "Turning Numbers Into Pictures"
> "Can Phone Data Detect Real-Time Unemployment?"
> "Researchers Link Ebola News Coverage to Public Panic on Social Media"
> "Fixating on Exascale Performance Only Is a Bad Idea"
> "Style Software Gives Fashion Tips After Judging What You Wear"
> "NASA's Robot Event Challenges Robots, Engineers"
> "Samsung, LG Smartwatches Give Up Personal Data to Researchers"
> "Traffic Monitoring to Generate Knowledge"
> "NYU Wireless Researchers Press for New mmWave Safety Metric"
> "President Obama: The Fast Company Interview"
> _______________________________________________________________________
> Using Virtual Reality to Overcome Fear, Reduce Prejudice
> USA Today (06/17/15) Edward C. Baig
> Overcoming phobias, confronting prejudices, tolerating pain, and encouraging healthier living are some of the benefits of virtual reality (VR) technology being explored at Stanford University's Virtual Human Interaction Lab.  Experiments involve subjects contained in a 20-foot by 20-foot space equipped with speakers and a vibrating floor, while high-tech cameras track light-emitting diode sensors worn on the participant's body.  Oculus Rift VR headgear completes the illusion with an overlay of images projected in the subject's field of vision.  "We study the transfer effect--how does an intense virtual reality experience change the way you think of yourself and others?" says lab director Jeremy Bailenson.  One demonstration has participants interact with an earthquake simulation, while another involves looking at an avatar of yourself that can change skin color, gender, and age, and that encounters prejudice from other avatars to help cultivate empathy.  Bailenson thinks the lab will be able to run more extensive experiments once tech companies start installing VR hardware in the home.  "VR is very good for rare moments and impossible moments," he says.  "What happens in a world where anything--the most intense thing that anyone has ever done physically--can happen to everyone at the push of a button?"
> Alabama Researcher Devises a Way to Harness Unused IoT Power
> IDG News Service (06/16/15) Joab Jackson
> University of Alabama at Birmingham (UAB) researchers have developed Aura, a computer architecture that would let people harness all of the unused computer cycles generated by their smart home devices.  Aura can connect hundreds of devices to make them work as a single computational resource.  For example, an Aura-based system could provide extra computational power to complete jobs that otherwise might require a desktop computer to complete.  With Aura, "everybody will become a cloud services provider," says UAB professor Ragib Hasan.  He notes that by 2020, the world will have 26 billion Internet of Things (IoT) devices, all of which will have leftover unused computational cycles.  Hasan says the key to realizing the potential of these devices is having them based on just a few operating systems, much like today's desktop computers predominately run Windows, Mac OS, and Linux.  Agreeing on a single or small number of open IoT platforms will enable developers to write software that can be used effectively across many devices.  Hasan's team already has started developing the needed software, building off of Google MapReduce.  The software can run jobs in a similar manner, but uses smaller IoT devices instead of servers.
> NSF Awards $12 Million to Spur an Engineering Education Revolution
> National Science Foundation (06/15/15) Sarah Bates
> The U.S. National Science Foundation (NSF) has awarded $12 million to engineering and computer science departments to enact revolutionary, scalable, and sustainable changes in undergraduate education.  "To flourish in the future, engineering and computer science must attract and retain people from all sectors of society," says NSF's Pramod Khargonekar.  The award, which is divided equally among six universities and will be distributed over five years, is part of NSF's multiyear effort to help universities substantially improve the professional formation of engineers and computer scientists.  A key part of the initiative is support for revolutionizing engineering departments (RED).  "RED focuses on transforming department structure and faculty reward systems to stimulate comprehensive change in policies, practices, and curricula," says NSF's Donna Riley.  The RED projects will build upon successful innovations to improve the undergraduate experience.  The RED investment aligns with the NSF-wide Improving Undergraduate STEM Education initiative.  The six RED awards were given to the Purdue University mechanical engineering department, the Colorado State University department of electrical and computer engineering, the University of North Carolina at Charlotte computer science department, the Arizona State University department of engineering and manufacturing engineering, the University of San Diego school of engineering, and the Oregon State University department of chemical, biomedical, and environmental engineering.
> Turning Numbers Into Pictures
> UTS News Room (06/16/15) Saffron Howden
> The University of Technology, Sydney's (UTS) Data Arena is a virtual reality theater four meters high and 10 meters across.  The image encircling the user is 10,000 pixels around, 1,200 pixels high, and two pixels deep.  UTS says the Data Arena, which officially opens next month, will be used by researchers, students, teachers, scientists, artists, industry, and the public to share masses of data, observe it, interact with it, change it, refine it, improve it, and learn from it.  Although the use of big data has become more commonplace, the idea of data provenance, which describes the transaction records that show changes to the data, is only just beginning to be appreciated by mainstream researchers.  For example, UTS professor Cynthia Whitchurch has used Houdini software to make a movie plotting the communal and individual movements of bacteria across a surface.  The Data Arena will enable Whitchurch to interact with the results of the research without the need for additional programming.  "As we're getting into bigger and bigger data, it becomes more and more important to figure out what we've got," says Data Arena lead developer Ben Simons.  "The way to make sense of all this big data is to visualize it."
> Can Phone Data Detect Real-Time Unemployment?
> MIT News (06/15/15) Peter Dizikes
> A multi-university team of researchers demonstrated that mobile phone data can provide rapid insight into employment levels because people's communications patterns change when they are not working.  Using an automotive plant closing in Europe that resulted in about 1,100 workers unemployed in a town of about 15,000 residents as the dataset for the study, the researchers found in the months following the layoffs, the total number of calls made by laid-off individuals dropped by 51 percent compared with working residents, and by 41 percent compared with all phone users.  In addition, the number of calls made by a newly unemployed worker to someone in the town where they had worked fell by 5 percent, and the number of individual cellphone towers needed to transmit the calls of unemployed workers dropped by about 20 percent.  "People's social behavior diminishes, and that might be one of the ways layoffs have these negative consequences," says Massachusetts Institute of Technology Ph.D. candidate Jameson Toole.  The researchers developed a model that correlates cellphone usage patterns with aggregate changes in employment.  "Using mobile phone data to project economic change would allow almost real-time tracking of the economy, and at very fine spatial granularities," says Northwestern University professor David Lazer.
> Researchers Link Ebola News Coverage to Public Panic on Social Media
> ASU News (06/15/15)
> Researchers from Arizona State University (ASU), Purdue University, and Oregon State University found news media is effective in creating public panic, according to an assessment of Twitter and Google search trend data.  A team led by ASU professor Sherry Towers collected data on millions of U.S. Ebola-related Google searches and tweets in October 2014 by examining certain phrases.  "When we compared the temporal patterns in these data to the patterns in the number of Ebola-related news stories that ran on major news networks, we found that the peaks and valleys in both almost exactly matched," says ASU professor Carlos Castillo-Chavez.  The team aligned a mathematical contagion model for the spread of disease to the data, and showed how trends in news stories explained nearly all of the variation in the social media.  News videos were especially effective at triggering public concern, with each news clip inspiring tens of thousands of Ebola-related tweets and Internet searches.  The analysis also identified a boredom effect, where after a few weeks, Ebola-related news stories became less and less able to inspire people to perform Ebola-related Google searches or tweets.  Towers is excited about the potential use for this study in future outbreak situations as it provides insight into how news media can manipulate public emotions on a topic.
> Fixating on Exascale Performance Only Is a Bad Idea
> HPC Wire (06/15/15) John Russell
> A concentration on realizing exascale computing performance to the exclusion of all else will not address the grand societal and scientific challenges, according to Harvard University lecturer Sadasivan Shankar.  He proposes an emerging materials science model called in silico inverse design, which involves distinct computational requirements that are different and challenging in comparison to direct design.  Shankar theorizes scientific and technological advancements have exceeded the capabilities of direct design, while the challenges confronting society and science share common technological disruptors--design, materials and devices, sensing, automation, and more--best resolved via inverse design.  Shankar defines inverse design as "the ability to use predictive capabilities, to design a material, which when synthesized in the manufacturing line will exhibit targeted properties."  He thinks the push to reach the exascale milestone is being played up while giving the practicality of developing real-world exascale applications little consideration.  Shankar says the uses and requirements of inverse design methodology ought to inform such initiatives.  He believes materials science is particularly relevant to this notion, as the field directly impacts economies and progress.  Shankar says semiconductor materials synthesis is one area that could benefit from inverse design.
> Style Software Gives Fashion Tips After Judging What You Wear
> New Scientist (06/16/15) Aviva Rutkin
> University of Toronto researcher Raquel Urtasun and colleagues in Spain have developed software that can judge outfits from a photograph and offer suggestions to make them look more chic.  The team gave the software a sense for fashion by showing it thousands of pictures from a popular style website and having it analyze the responses left by users.  The software takes into consideration the user's geographic location, the date the photo was posted, the background of the picture, and written descriptions of the clothing.  "Not everybody has access to an expert," Urtasun says.  "You can imagine something like this being used [to style photos for] dating sites and Facebook profiles."  The researchers also are considering improving the software in the hope it can automate the work of a human stylist.  Urtasun presented the work last week at the Computer Vision and Pattern Recognition conference in Boston.
> NASA's Robot Event Challenges Robots, Engineers
> Computerworld (06/12/15) Sharon Gaudin
> The U.S. National Aeronautics and Space Administration's (NASA) 2015 Sample Return Robot Challenge was designed to encourage researchers to develop robotics and autonomy software that could be used in future space missions.  The challenge involved 16 robotics teams from around the U.S. and required each team to navigate its robot around a large field, find a range of objects, and bring it back to the starting platform.  NASA hopes the challenge will result in better technology so robots can work autonomously on other planets.  On the first day of the competition, nine teams competed in Level 1, which required the robots to autonomously move off a starting platform and find and retrieve a single object.  Only three of the nine teams were able to make it off the platform and none were able to find the first object.  On the second day, two Level 2 teams had slightly more success: one of the robots found its first object, and a second robot was the only system to find the required three objects.  Despite the modest successes, "We saw teams detecting samples, teams attempting to pick them up and, in several cases, actually collecting the sample," says NASA challenge manager Colleen Shaver.
> Samsung, LG Smartwatches Give Up Personal Data to Researchers
> CNet (06/11/15) Stephen Shankland
> Researchers at the University of New Haven's Cyber Forensics Research and Education Group (UNHCFREG) have shown they can extract personal information from two smartwatches because none of the data is encrypted.  From one watch, the researchers were able to retrieve email, calendar, contacts, and pedometer data.  From the other watch, the researchers were able to retrieve health, email, messages, and contacts data.  The researchers noted the ease with which the smartwatches were hacked highlights the importance of data encryption.  "It was not very difficult to get the data, but expertise and research was required," says UNHCFREG director Ibrahim Baggili.  The researchers will present a paper on their work at a digital forensics conference in August.  Last year, UNHCFREG researchers found that many smartphone communications apps were sending messages without using encryption.  In addition, earlier this year the group released Datapp, a Windows program that enables people to check for unencrypted message data.
> Traffic Monitoring to Generate Knowledge
> Universidad Politecnica de Madrid (Spain) (06/15/15)
> A new application developed by a team from the Polytechnic University of Madrid could help improve traffic congestion.  BlueTT detects Bluetooth devices in vehicles and generates information on road conditions.  The software, which is used in conjunction with a monitoring system, connects thousands of detectors on the same platform.  Researchers in the university's School of Telecommunications Engineering designed BlueTT to process information such as the travel time between two points and the distribution of traffic at intersections.  The technology can assist city officials and highway authorities with their traffic management efforts.  The software can forecast travel times, provide updates every minute, and automatically adapt specific traffic conditions at all times.  The system has been running in real traffic conditions in Madrid and Seville since late 2013.  The university is finalizing agreements with traffic authorities to use BlueTT.
> NYU Wireless Researchers Press for New mmWave Safety Metric
> FierceWirelessTech (06/12/15) Monica Alleven
> Growing interest in using millimeter-wave (mmWave) technology for wireless communications prompted researchers at the New York University (NYU) Wireless multi-disciplinary academic research center to support new safety metrics based on body temperature instead of the existing power density-based standard.  The study used four models representing different body parts, both clothed and unclothed, to gauge the thermal effects of mmWave radiation on humans.  The researchers conducted a simulation showing steady state temperature increases are negligible, even of clothed parts with less blood flow, in comparison to environmental temperature variations.  The exposure intensity for the latter is similar to that likely to be used in a next-generation cellphone.  "Because future devices will operate on a spectrum with different properties than today's communications devices, [U.S. Federal Communications Commission (FCC)] rules and regulations on safety must be reviewed and adjusted accordingly," says NYU Wireless director Ted Rappaport.  The researchers also recommend mmWave devices be evaluated to comply with government exposure guidelines before they are introduced to the consumer market.  In the U.S., the FCC uses the specific absorption rate (SAR) as a metric for exposure compliance for frequencies below 6 GHz--but at higher frequencies, energy absorption is increasingly confined to the surface layers of the skin, making it challenging to define a meaningful volume for SAR evaluation.
> President Obama: The Fast Company Interview
> Fast Company (06/15/15) Robert Safian
> In an interview, U.S. President Barack Obama discusses the "digital teams" of technologists that he has brought in to help improve technology across the executive branch of government.  The president notes although his experiences using technology in his two presidential election campaigns gave him an appreciation of how modern technology can be used in the government sector, it wasn't until the spectacular failure of that he and his team got serious about changing the way the government approaches technology.  He established the digital teams as a way of bringing in outside technologists, often successful members from leading technology companies, on a temporary basis to find ways of improving federal agencies' use of technology.  He hopes the strategy of forming digital teams using tech experts from outside of government will persist as a model even after his time in the White House ends.  The president also discussed technology's ability to change the way citizens interact with the government, noting the potential for technologies such as online voting to help people who currently feel alienated to reengage with the democratic process, especially the younger generation.  "I think the opportunities for us to think about how tech can empower citizens and make them feel ownership for their government is really important," Obama says.

Sunday, May 17, 2015

Thursday, April 30, 2015

Why Coding Is Your Child's Key to Unlocking the Future

The Wall Street Journal (04/26/15) Christopher Mims

An increasing number of educators and activists are pushing to make programming a part of all children's basic education. Most argue programming should be viewed as a foundational element of a modern education, the same as math or reading. Massachusetts Institute of Technology professor Mitchel Resnick, who is leading the effort to develop the child-friendly Scratch programming language, says in addition to granting them an important and marketable skill, coding helps children learn to think about processes in the world. Hadi Partovi, co-founder of, says computer science helps promote analytical skills, problem solving, and creativity. Many activists point to a U.S. Bureau of Labor Statistics projection that there will be 1 million unfilled programming jobs by 2020 as evidence of the growing market for such skills. Partovi thinks this could be a significant underestimate. However, programming is still not taught in the vast majority of U.S. schools, so many are looking to find ways of teaching children to code outside of the classroom. Some, such as Bryson Payne, author of "Teach Your Kids to Code," are seeking to teach children to code as early as possible. Many say the most effective way of teaching children how to code is to have them design games or to treat coding as simply another form of play.
View Full Article

One Way to Reduce Email Stress: Re-Invent the Mailing List

MIT News (04/27/15) Adam Conner-Simons

Researchers at the Massachusetts Institute of Technology's Computer Science and Artificial Intelligence Laboratory (CSAIL) have developed a prototype system called Murmur they hope will improve the experience of using email mailing lists by incorporating popular social media features such as upvoting, following, and blocking. CSAIL Ph.D. student Amy Zhang presented a paper on Murmur at last week's ACM CHI conference in Seoul, Korea. Zhang says it is surprising that email mailing lists have retained their popularity and have changed so little since their inception decades ago. The basic thrust of Murmur is to enable users to customize the ways they interact with mailing lists. One of the new system's features is the ability to post messages to specific mailing list members and not others, which Zhang says could help encourage people who want to contribute but worry about "spamming" people. Recipients will be able to give these messages the equivalent of a Facebook "Like," such that it automatically spreads to more list recipients. Users also will be able to customize how much content they receive, for example by "following" certain users or specifying how many emails with certain tags they wish to receive in a given day or week.
View Full Article

Five new open source project management tools for 2015 |

Why to choose RADIUS over LDAP |

The best reason why RADIUS should be favored over LDAP: an LDAP server considers itself to be the final authority for authorization and authentication; a RADIUS server will split authentication and authorization. Authentication is who you are. Authorization is what you are allowed to do. Splitting them is important because increasingly you need two-factor authentication. You don't have to split them, though. Supporting RADIUS also gets you LDAP.

How To Install LAMP Stack On Ubuntu 15.04

Pascal Fares

Thursday, March 12, 2015

Wednesday, March 11, 2015

Build Your Information System For Free Using These Tools

Information system is a very essential and fundamental component in every business and organization. Generally, it is a set of network of hardware and software which users use to collect, manage, create and distribute their data.
It consists on the information and communication technology utilized by organizations for supporting their business processes. As it is important to create and have the right information system it is also important to find the right tools to use for making your own information system.
But what do you think if you can build your information system for free? Yes for free, it is not a jock. Follow us and you will understand that this can be a reality. We will describe the different tools one by one giving the benefits of using every one of them just for making your information system.

Network bounding

Network bonding is a method of combining (joining) two or more network interfaces together into a single interface. It will increase the network throughput, bandwidth and will give redundancy. If one interface is down or unplugged, the other one will keep the network traffic up and alive. Network bonding can be used in situations wherever you need redundancy, fault tolerance or load balancing networks.
Linux allows us to bond multiple network interfaces into single interface using a special kernel module named bonding. The Linux bonding driver provides a method for combining multiple network interfaces into a single logical “bonded” interface. The behaviour of the bonded interfaces depends upon the mode; generally speaking, modes provide either hot standby or load balancing services. Additionally, link integrity monitoring, may be performed.

Sunday, March 8, 2015

Installing The Canonical Distribution of Ubuntu OpenStack

One of the way to build an OpenStack cloud is by using The Canonical Distribution of Ubuntu OpenStack. Follow the instructions:

Friday, March 6, 2015

Wget and proxy

Tuesday, February 17, 2015

#OpenInnoWkLB aims to support a growing community around open source software, hardware, disruptive and creative art, and inspire young developers, university students, and creative people of all ages to build networks with the open source community. This effort was initiated by the joint effort of the World Bank and the Lebanese Ministry of Telecommunications to support progress towards launching the MiHub (Mobile Innovation Hub) in Lebanon, incorporating open innovation principles.
AltCity is Lead Organizer of OpenInnoWkLB.
Key Community Partners include: HBR, Naharnet, LebGeeks, Bader Young Entrepreneurs Program.

The Challenge

We are launching a competition for great open source/open innovation solutions to critical challenges in Lebanon that can scale to the world. The Challenge areas will be announced in January 2015, with the final pitches during #OpenInnoWkLB. Top teams will get funding, startup support, plus the opportunity to travel to key conferences and startup programs in Europe and MENA.

More :

Tuesday, February 10, 2015

OPEN Hardware design

With the rise of distributed manufacturing of 3D printing, hardware designs released under open source licenses are increasing exponentially. These designs—for everything from phone cases to prosthetic hands for children—can have an enormous value for those who need and want them.

Saturday, February 7, 2015

Open hardware

Hardware design and development traditionally have been shrouded in secrecy, with companies desperate to keep their designs for internal use only. But in a world where sharing and transparency have become the norm, and global collaborative development is no longer just a phrase used by marketers—at least in software engineering—it’s time for things to change.
Hardware engineering needs to take the same open source path as software to enable rapid innovation and progress—but will only be possible when engineers aren’t wasting time reinventing the wheel.

Monday, February 2, 2015

Open Source in the class

Open source is sitting at the head of the class in a growing number of schools with all levels of education. Its no-cost starting point and use-it-your-way flexibility gives open source technology an advantage over proprietary solutions with its no-license and no-fee lesson plan. For many education outlets looking to bring a fresh approach to technology, open source is an easy selling point. Don't think so? LinuxInsider spoke with several technology administrators around the country who gave their open source experiences a solid A+.
Read more at LinuxInsider

Monday, January 19, 2015

Join the Linux Foundation

The Linux Foundation is a non-profit consortium dedicated to fostering the growth of Linux. Founded in 2007, The Linux Foundation sponsors the work of Linux creator Linus Torvalds and is supported by leading Linux and open source companies and developers from around the world.

Join The Linux Foundation and Help Support the Advancement of Linux

Become a Member
Linux is a product of mass collaboration unmatched in the history of computing. Since no one entity “owns” Linux, it calls upon an organization to provide those services needed to advance the platform. Members of The Linux Foundation support the neutral development, promotion and protection of the platform with their membership fees. By becoming a corporate or individual member, you can proudly say you support these activities:
  • Employing key Linux fellows, including Linus Torvalds, to ensure they can focus 100% of their attention on maintaining and furthering the Linux platform
  • Administering and defending the Linux trademark to protect the investment in the brand “Linux”
  • Facilitating crucial administrative, technical and legal functions for the Kernel developer community to enable them to continue to advance the platform
  • Serving as the neutral voice for Linux with press and analysts to ensure that Linux is defended against competitor threats and remains a successful, thriving and growing operating system
  • Increasing the number of applications on the Linux platform through its developer services
  • Serving as a proxy between the community, industry and end users to ensure everyone’s needs are best understood and that collaboration solutions are optimized
  • Holding neutral collaboration and legal events to ensure the platform is advanced and protected
  • Providing a neutral forum for technical collaboration and standardization
Questions and Information
Please contact us with questions about joining the organization.
Learn More About Corporate MembershipLearn More About Individual Membership

Learn More

Wednesday, January 7, 2015

Beginners guide to contributing to open source software

MediaGoblin is a free software media publishing platform that anyone can run.

MediaGoblin is a free software media publishing platform that anyone can run. You can think of it as a decentralized alternative to Flickr, YouTube, SoundCloud, etc.